![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Computing & IT > Computer hardware & operating systems > Operating systems & graphical user interfaces (GUIs) > General
Discover the latest information for working on Windows, Mac OS, and UNIX/Linux platforms with GUIDE TO OPERATING SYSTEMS, 5E. You examine operating system theory, installation, upgrading, configuring operating system and hardware, file systems, virtualization, security, hardware options, storage, resource sharing, network connectivity, maintenance, and troubleshooting. Easily understood and highly practical, GUIDE TO OPERATING SYSTEMS, 5E is the resource you need to deepen your understanding of different operating systems. This edition helps you understand the fundamental concepts of computer operating systems. The book specifically addresses Windows 10 and earlier Windows client OSs, Windows Server 2012 R2 and earlier Windows server OSs with a preview of Windows Server 2016, Fedora Linux, and Mac OS X El Capitan and earlier. In addition, general information prepares you to work with many other operating systems.
This book constitutes the proceedings papers of the 14th IFIP Working Conference on the Practice of Enterprise Modeling, held in Riga, Latvia, during November 24-26, 2021. PoEM offers a forum for sharing experiences and knowledge between the academic community and practitioners from industry and the public sector. This year the theme of the conference is the use of enterprise modeling and enterprise architecture towards ensuring sustainability and resilience of enterprises and societies. The 14 full and 6 short papers presented in this volume were carefully reviewed and selected from a total of 47 submissions. They were organized in topical sections named: enterprise modeling and enterprise architecture; enterprise modeling methods and method engineering; business process modeling and management; requirements engineering for privacy, security and governance; and case studies and experiences.
How can we provide guarantees of behaviours for autonomous systems such as driverless cars? This tutorial text, for professionals, researchers and graduate students, explains how autonomous systems, from intelligent robots to driverless cars, can be programmed in ways that make them amenable to formal verification. The authors review specific definitions, applications and the unique future potential of autonomous systems, along with their impact on safer decisions and ethical behaviour. Topics discussed include the use of rational cognitive agent programming from the Beliefs-Desires-Intentions paradigm to control autonomous systems and the role model-checking in verifying the properties of this decision-making component. Several case studies concerning both the verification of autonomous systems and extensions to the framework beyond the model-checking of agent decision-makers are included, along with complete tutorials for the use of the freely-available verifiable cognitive agent toolkit Gwendolen, written in Java.
There is a rapid growth of automation in server rooms and data centers. The days of having many administrators running around busily configuring and maintaining servers are gone and have been replaced with droves of Salt-Minions; agents beavering away on the target nodes ensuring the configuration is as specified. This book covers Salt Open (also known as SaltStack Open) from the ground up and shows you how to work with two Linux distributions. You'll see how Salt Open is duplicated with ArubaOS and IOS networking devices, which can be configured without the underlying OS. As you step through the configuration options, you'll learn how to run remote execution modules from the CLI before looking at stateful configuration using SLS files. Moving on, you'll learn how to configure the systems where you also need to monitor your devices and that is when reactors and beacons come into play. Creating beacons to alert the server when thresholds are exceeded, you will be able to create reactors to mitigate the issues identified by the beacons. By the end of this book, you will be able to deploy Salt to your servers and network infrastructure. You will be able to install the Salt-Master and Salt-Minion, executing commands from both the Master and the Minion. The networking devices you need to manage will be controlled through the Salt_Proxy Minions that you have configured. Finally, you will be able to load-balance connections to the master with Salt-Syndic. What You'll Learn Install Salt Services on Ubuntu and CentOS based systems Work with remote execution modules Format YAML files correctly Provide defined configuration using state files Use Salt-Proxy to configure network devices Automate the configuration of Linux servers and networking devices Add value for both the server and network automation team Who This Book Is For System administrators experienced in Linux administration, who desire to expand their horizons into the world of automation, moving from scripts to states.
Gain a solid understanding of how Linux C and C++ compilers generate binary code. This book explains the reversing and binary analysis of ARM64 architecture now used by major Linux cloud providers and covers topics ranging from writing programs in assembly language, live debugging, and static binary analysis of compiled C and C++ code. It is ideal for those working with embedded devices, including mobile phones and tablets. Using the latest version of Red Hat, you'll look closely at the foundations of diagnostics of core memory dumps, live and postmortem debugging of Linux applications, services, and systems. You'll also work with the GDB debugger and use it for disassembly and reversing. This book uses practical step-by-step exercises of increasing complexity with explanations and many diagrams, including some necessary background topics. In addition, you will be able to analyze such code confidently, understand stack memory usage, and reconstruct original C/C++ code. And as you'll see, memory forensics, malware, and vulnerability analysis, require an understanding of ARM64 assembly language and how C and C++ compilers generate code, including memory layout and pointers. This book provides the background knowledge and practical foundations you'll need to understand internal Linux program structure and behavior. Foundations of ARM64 Linux Debugging, Disassembling, and Reversing is the perfect companion to Foundations of Linux Debugging, Disassembling, and Reversing for readers interested in the cloud or cybersecurity. What You'll Learn Review the basics of ARM64 assembly language Examine the essential GDB debugger commands for debugging and binary analysis Study C and C++ compiler code generation with and without compiler optimizations Look at binary code disassembly and reversing patterns See how pointers in C and C++ are implemented and used Who This Book Is ForSoftware support and escalation engineers, cloud security engineers, site reliability engineers, DevSecOps, platform engineers, software testers, Linux C/C++ software engineers and security researchers without ARM64 assembly language background, and beginners learning Linux software reverse engineering techniques.
This book constitutes the proceedings of the 29th International Conference on Web Services, ICWS 2022, held in Honolulu, USA, as part of SCF 2022, during December 10-14, 2022.The 9 full papers presented in this volume were carefully reviewed and selected from 20 submissions. The papers cover aspects of services computing and applications. Centered around services computing, it covers various systems and networking research pertaining to cloud, edge and Internet-of-Things (IoT), as well as technologies for intelligent computing, learning, big data and blockchain applications.
Harbor is a major CNCF open source project, with thousands of production users all over the world. This book provides a comprehensive explanation of the open source cloud native registry: Harbor. Written by experts who contributed to and now maintain Harbor, the content covers its architecture, principles, functions, deployment and configuration, scanning artifacts, remote replication, operation and maintenance, customized development, API usage and success stories. The book offers a valuable guide for Harbor users, developers and contributors, cloud native software development engineers, test engineers, operational and maintenance engineers, IT architects and IT technical managers. It will also benefit university students in computer-related disciplines.
This book constitutes revised selected papers from the proceedings of the 26th International Conference on Financial Cryptography and Data Security, FC 2022, which was held in Grenada during May 2022. The 32 full papers and 4 short papers included in this book were carefully reviewed andselected from 159 submissions. They were organized in topical sections as follows: tokenomics; MPC (mostly); privacy; ZKP; old-school consensus; mostly payment networks; incentives; not proof of work; performance; measurements.
This book constitutes the revised selected papers of the 10th International Conference on Networked Systems, NETYS 2022, held as virtual event, in May 17-19, 2022. The conference was held virtually due to the COVID-19 crisis.The 18 full papers and 2 short papers presented were carefully reviewed and selected from 100 submissions. The scope of the conference covers all aspects related to the design and the development of these systems, including multi-core architectures, Concurrent and distributed algorithms, parallel/concurrent/distributed programming, distributed databases, big data applications and systems, cloud systems, networks, security, and formal verification. They were organized in topical sections as follows: Distributed System; Networking; Verification; Security.
Now in its Seventh Edition, UNDERSTANDING OPERATING SYSTEMS continues to provide a clear and straightforward explanation of operating system theory and practice. As in previous editions, the book's highly regarded structure begins with a discussion of fundamentals before moving on to specific operating systems. Fully updated, this new edition includes expanded analysis of the impact on operating systems of such innovations as multi-core processing and wireless technologies. Revised Research Topics in the exercise section encourage independent student research. The final four chapters have been updated to include information on current versions of UNIX (including the latest Macintosh OS), Linux, and Windows, and a new chapter on Android has been added.
Based on lectures given at a summer school on computer algebra, the book provides a didactic description of the facilities available in three computor algebra systems - MAPLE, REDUCE and SHEEP - for performing calculations in the algebra-intensive field of general relativity. With MAPLE and REDUCE, two widespread great-purpose systems, the reader is shown how to use currently available packages to perform calculations with respect to tetrads, co-ordinate systems, and Poincare` gauge theory. The section on SHEEP and Stensor, being the first published book on these systems, explains how to use these systems to tackle a wide range of calculations with respect to tackle a wide range of calculations in general relativity, including the manipulation of indicial formulae. For the researcher in general relativity, the book therefore promises a wide overview of the facilities available in computer algebra to lessen the burden of the lengthy, error-prone calculations involved in their research.
This open access State-of-the-Art Survey presents the main recent scientific outcomes in the area of reversible computation, focusing on those that have emerged during COST Action IC1405 "Reversible Computation - Extending Horizons of Computing", a European research network that operated from May 2015 to April 2019. Reversible computation is a new paradigm that extends the traditional forwards-only mode of computation with the ability to execute in reverse, so that computation can run backwards as easily and naturally as forwards. It aims to deliver novel computing devices and software, and to enhance existing systems by equipping them with reversibility. There are many potential applications of reversible computation, including languages and software tools for reliable and recovery-oriented distributed systems and revolutionary reversible logic gates and circuits, but they can only be realized and have lasting effect if conceptual and firm theoretical foundations are established first.
This book constitutes the refereed conference proceedings of the 29th International Colloquium on Structural Information and Communication Complexity, SIROCCO 2022, held in Paderborn, Germany, in June 2022. The 16 full papers presented in this book were carefully reviewed and selected from 30 submissions. SIROCCO is devoted to the study of the interplay between structural knowledge, communication, and computing in decentralized systems of multiple communicating entities. Special emphasis is given to innovative approaches leading to better understanding of the relationship between computing and communication.
This book contains extended versions of the best papers presented at the First International Workshop on Distributed Computing for Emerging Smart Networks, DiCES-N 2019, held in Hammamet, Tunisia, in October 2019. The 9 revised full papers included in this volume were carefully reviewed and selected from 24 initial submissions. The papers are organized in the following topical sections: intelligent transportation systems; distributed computing for networking and communication; articial intelligence applied to cyber physical systems.
The LNCS volume 13269 constitutes the proceedings of the 20th International Conference on Applied Cryptography and Network Security, ACNS 2022, which will take place in a hybrid mode in Rome, Italy in June 2022. The 44 full papers together with 5 short papers presented in this proceeding were carefully reviewed and selected from a total of 185 submissions. They were organized in topical sections as follows: Encryption, Attacks, Cryptographic Protocols, System Security., Cryptographic Primitives, MPC, Blockchain, Block-Cyphers, and Post-Quantum Cryptography.
This book is the sixth volume of the successful book series on Robot Operating System: The Complete Reference. The objective of the book is to provide the reader with comprehensive coverage of the Robot Operating Systems (ROS) and the latest trends and contributed systems. ROS is currently considered as the primary development framework for robotics applications. There are seven chapters organized into three parts. Part I presents two chapters on the emerging ROS 2.0 framework; in particular, ROS 2.0 is become increasingly mature to be integrated into the industry. The first chapter from Amazon AWS deals with the challenges that ROS 2 developers will face as they transition their system to be commercial-grade. The second chapter deals with reactive programming for both ROS1 and ROS. In Part II, two chapters deal with advanced robotics, namely on the usage of robots in farms, and the second deals with platooning systems. Part III provides three chapters on ROS navigation. The first chapter deals with the use of deep learning for ROS navigation. The second chapter presents a detailed tuning guide on ROS navigation and the last chapter discusses SLAM for ROS applications. I believe that this book is a valuable companion for ROS users and developers to learn more ROS capabilities and features.
This book constitutes the proceedings of the 16th International Conference on Distributed Computing and Internet Technology, ICDCIT 2020, held in Bhubaneswar, India, in January 2020. The 20 full and 3 short papers presented in this volume were carefully reviewed and selected from 110 submissions. In addition, the book included 6 invited papers. The contributions were organized in topical sections named: invited talks; concurrent and distributed systems modelling and verification; cloud and grid computing; social networks, machine learning and mobile networks; data processing and blockchain technology; and short papers.
This book constitutes revised selected papers of the 8th Latin American High Performance Computing Conference, CARLA 2021, held in Guadalajara, Mexico, in October 2021. Due to the COVID-19 pandemic the conference was held in a virtual mode. The 16 revised full papers and 2 short papers presented were carefully reviewed and selected out of 45 submissions. The papers included in this book are organized according to the topics on high performance computing; high performance computing and artificial intelligence; high performance computing applications.
This book constitutes the thoroughly refereed post-conference proceedings of the 34th International Workshop on Languages and Compilers for Parallel Computing, LCPC 2020, held in Delaware, NE, USA, in October 2021.Due to COVID-19 pandemic the conference was held virtually. The 9 revised full papers were carefully reviewed and selected from 11 submissions. The conference covers all aspects of languages, compiler techniques, run-time environments, and compiler-related performance evaluation for parallel and high-performance computing. The scope of the workshop encompasses foundational results, as well as practical experience reports and bold new ideas for future systems.
This book constitutes the proceedings of the 32nd International Conference on Architecture of Computing Systems, ARCS 2019, held in Copenhagen, Denmark, in May 2019. The 24 full papers presented in this volume were carefully reviewed and selected from 40 submissions. ARCS has always been a conference attracting leading-edge research outcomes in Computer Architecture and Operating Systems, including a wide spectrum of topics ranging from embedded and real-time systems all the way to large-scale and parallel systems. The selected papers are organized in the following topical sections: Dependable systems; real-time systems; special applications; architecture; memory hierarchy; FPGA; energy awareness; NoC/SoC. The chapter 'MEMPower: Data-Aware GPU Memory Power Model' is open access under a CC BY 4.0 license at link.springer.com.
Learn how to leverage infrastructure as code with Azure Resource Manager (ARM) and the best practices to build, test, debug, and deploy your applications in Microsoft Azure using ARM templates and the new domain-specific language Bicep. As organizations consider moving partially or fully to the cloud, infrastructure as code (IaC) has become a key component to improving time to market for their applications. However, it is critical that enterprise infrastructure professionals use the right resources and strategies to build the infrastructure required to run applications in the cloud. Azure cloud-native components and capabilities automate the build and deployment process, offering a myriad of compelling reasons to leverage IaC to build your applications in Azure. Starting with the evolution of the software-defined approach and building on the basic concepts of infrastructure as code, this book provides you with comprehensive guidance to learn Azure Resource Manager from the ground up. You will learn the best practices for deploying and maintaining application infrastructure, such as template authoring tooling enhancements, Azure DevOps integrations, and updates to the deployment platform. After reading this book, you will understand the breadth and use cases of ARM capabilities and tooling within Microsoft Azure. You will be able to build, test, debug, and deploy your ARM templates and know how to use infrastructure as code to better manage the life cycle of your applications in Azure. What You Will Learn Introduces the concepts of infrastructure as code and how to leverage it using Azure Resource Manager Teaches how to enable and deploy Azure Resource Manager templates Covers the basic core elements of an ARM template to start authoring your templates and building your applications in the cloud Dives into core components such as parameters, variables, functions, dependencies, deployment modes, loops, conditions), enabling nested templates Reveals the built-in services and features in Azure, allowing the debugging process and validation process of the ARM templates Discusses "Bicep" the language for ARM templates and the DevOps integration to deploy ARM templates Who This Book Is For People who build, install, repair, or maintain the hardware and software associated with computer systems on-premises and who want to learn about the deployment and provisioning process of applications in the Microsoft Cloud using an infrastructure as code approach through Azure Resource Manager. Readers should have an Azure account and be familiar with the main Azure services (storage, compute, networking, management). Basic knowledge of PowerShell is also useful.
Troubleshoot Windows 10 the way the experts do, whatever device or form factor you are using. Focus on the problems that most commonly plague PC users and fix each one with a step-by-step approach that helps you understand the cause, solution, and tools required. Windows 10 is constantly evolving and changing and a great many aspects of the operating system, including many associated with troubleshooting and repair, have been changed, removed, replaced, or expanded since the first edition of this book was published. This new edition is updated with a dedicated chapter on using scripting tools for troubleshooting along with numerous updates on Windows device and update installation, Microsoft Sysinternals Suite, and Troubleshooting malware attacks. Additionally, there is extensive coverage of the technical diagnosis and troubleshooting tools you need from Event Viewer to Recovery Console. This book will help you discover the connections between different hardware and software in your devices, and how their bonds with external hardware, networks, and the Internet are more inter-dependent than you think. You will also learn how to support the increasing volume of home workers, and make sure they can stay online and active on PCs from your own organization or their own devices. If you are fed up with those nagging, day-to-day issues, want to avoid costly repairs, or just want to learn more about how PCs work, Windows 10 Troubleshooting is your ideal one-stop guide to the Windows 10 operating system. What You Will Learn Understand your PC's ecosystem and how to connect the dots, so you can successfully track problems to their source Support home workers using PCs from your organization and family devices, and keep workers productive and online Make your PC safe and secure for family and everyone in your workplace, and ensure that data is kept secure from loss or attack Understand the threat from malware and viruses and a range of approaches to dealing with them, depending on the situation Know tips and tricks for researching difficult problems, including third-party tools and useful web resources Who This Book Is For Anyone using Windows 10 on a desktop, laptop, or hybrid device
Nowadays, many aspects of electrical and electronic engineering are essentially applications of DSP. This is due to the focus on processing information in the form of digital signals, using certain DSP hardware designed to execute software. Fundamental topics in digital signal processing are introduced with theory, analytical tables, and applications with simulation tools. The book provides a collection of solved problems on digital signal processing and statistical signal processing. The solutions are based directly on the math-formulas given in extensive tables throughout the book, so the reader can solve practical problems on signal processing quickly and efficiently. FEATURES Explains how applications of DSP can be implemented in certain programming environments designed for real time systems, ex. biomedical signal analysis and medical image processing. Pairs theory with basic concepts and supporting analytical tables. Includes an extensive collection of solved problems throughout the text. Fosters the ability to solve practical problems on signal processing without focusing on extended theory. Covers the modeling process and addresses broader fundamental issues.
This book constitutes the refereed proceedings of the 23rd International Symposium on Stabilization, Safety, and Security of Distributed Systems, SSS 2021, held virtually, in November 2021. The 16 full papers, 10 short and 14 invited papers presented were carefully reviewed and selected from 56 submissions. The papers deal with the design and development of distributed systems with a focus on systems that are able to provide guarantees on their structure, performance, and/or security in the face of an adverse operational environment.
This double volume constitutes the thoroughly refereed post-conference proceedings of the 25th International Conference on Financial Cryptography and Data Security, FC 2021, held online due to COVID-19, in March 2021.The 47 revised full papers and 4 short papers together with 3 as Systematization of Knowledge (SoK) papers were carefully selected and reviewed from 223 submissions. The accepted papers were organized according to their topics in 12 sessions: Smart Contracts, Anonymity and Privacy in Cryptocurrencies, Secure Multi-Party Computation, System and Application Security, Zero-Knowledge Proofs, Blockchain Protocols, Payment Channels, Mining, Scaling Blockchains, Authentication and Usability, Measurement, and Cryptography. |
You may like...
UC/OS-III - The Real-Time Kernel and the…
Jean J. Labrosse, Juan P. Benavides, …
Hardcover
R2,203
Discovery Miles 22 030
|